12Jul
Just thought I would comment on the use of Cloud Computing for data storage, such as Backups files and...
Read More
10Mar
In February 2019, the email address validation service verifications.io suffered a data breach. The breach was due to the...
Read More
24Apr
In January 2018, the children's gaming site Club Penguin Rewritten (CPRewritten) suffered a data breach (note: CPRewritten is an...
Read More
09Apr
In September 2018, the German social media website Knuddels suffered a data breach. The incident exposed 808k unique email...
Read More
15Oct
What is WHOIS?
WHOIS stands for "Who is?" and is a utility used to look up information on domain names....
Read More
16Mar
Let's take a moment and talk about some upcoming changes to the WiFi standards, these changes will bring massive...
Read More
25Nov
Introduction
RAID (Redundant Array of Independent Disks, originally Redundant Array of Inexpensive Disks) is a data storage virtualization technology that...
Read More
04Feb
Did you know that you can lose files by accidentally deleting or replacing them, because of a virus or...
Read More
18Jul
In June 2018, online fashion retailer SHEIN suffered a data breach. The company discovered the breach 2 months later...
Read More
04Feb
Most of us know that without proper maintenance, your car's performance will degrade over time. The same applies to...
Read More
Leave a Reply
You must be logged in to post a comment.